CVE-2022-46180 – Arbitrary HTML injection in discourse-mermaid-theme-component
https://notcve.org/view.php?id=CVE-2022-46180
Discourse Mermaid (discourse-mermaid-theme-component) allows users of Discourse, open-source forum software, to create graphs using the Mermaid syntax. Users of discourse-mermaid-theme-component version 1.0.0 who can create posts are able to inject arbitrary HTML on that post. The issue has been fixed on the `main` branch of the GitHub repository, with 1.1.0 named as a patched version. Admins can update the theme component through the admin UI. As a workaround, admins can temporarily disable discourse-mermaid-theme-component. • https://github.com/discourse/discourse-mermaid-theme-component/commit/c10bc4a08bf865cee20e5d5dffba535762813f0f https://github.com/discourse/discourse-mermaid-theme-component/pull/14 https://github.com/discourse/discourse-mermaid-theme-component/security/advisories/GHSA-8437-hgcm-p3q3 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-46159 – Any authenticated Discourse user can create an unlisted topic
https://notcve.org/view.php?id=CVE-2022-46159
Discourse is an open-source discussion platform. In version 2.8.13 and prior on the `stable` branch and version 2.9.0.beta14 and prior on the `beta` and `tests-passed` branches, any authenticated user can create an unlisted topic. These topics, which are not readily available to other users, can take up unnecessary site resources. A patch for this issue is available in the `main` branch of Discourse. There are no known workarounds available. • https://github.com/discourse/discourse/commit/0ce38bd7bce862db251b882613ab7053ca777382 https://github.com/discourse/discourse/security/advisories/GHSA-qf99-xpx6-hgxp • CWE-770: Allocation of Resources Without Limits or Throttling •
CVE-2022-46162 – Discourse BBCode plugin vulnerable to arbitrary CSS injection
https://notcve.org/view.php?id=CVE-2022-46162
discourse-bbcode is the official BBCode plugin for Discourse. Prior to commit 91478f5, CSS injection can occur when rendering content generated with the discourse-bccode plugin. This vulnerability only affects sites which have the discourse-bbcode plugin installed and enabled. This issue is patched in commit 91478f5. As a workaround, ensure that the Content Security Policy is enabled and monitor any posts that contain bbcode. discurso-bbcode es el complemento oficial de BBCode para Discourse. • https://github.com/discourse/discourse-bbcode/commit/91478f5cfecdcc43cf85b997168a8ecfd0f8df90 https://github.com/discourse/discourse-bbcode/security/advisories/GHSA-8c87-xpqv-c7mp • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-46148 – Discourse allows self-XSS through malicious composer message
https://notcve.org/view.php?id=CVE-2022-46148
Discourse is an open-source messaging platform. In versions 2.8.10 and prior on the `stable` branch and versions 2.9.0.beta11 and prior on the `beta` and `tests-passed` branches, users composing malicious messages and navigating to drafts page could self-XSS. This vulnerability can lead to a full XSS on sites which have modified or disabled Discourse’s default Content Security Policy. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Discourse es una plataforma de mensajería de código abierto. • https://github.com/discourse/discourse/security/advisories/GHSA-c5h6-6gg5-84fh • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-46150 – Discourse may allow exposure of hidden tags in the subject of notification emails
https://notcve.org/view.php?id=CVE-2022-46150
Discourse is an open-source discussion platform. Prior to version 2.8.13 of the `stable` branch and version 2.9.0.beta14 of the `beta` and `tests-passed` branches, unauthorized users may learn of the existence of hidden tags and that they have been applied to topics that they have access to. This issue is patched in version 2.8.13 of the `stable` branch and version 2.9.0.beta14 of the `beta` and `tests-passed` branches. As a workaround, use the `disable_email` site setting to disable all emails to non-staff users. Discourse es una plataforma de debate de código abierto. • https://github.com/discourse/discourse/commit/84c83e8d4a1907f8a2972f0ab44b6402aa910c3b https://github.com/discourse/discourse/security/advisories/GHSA-rqvq-94h8-p5wv • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •